The Analysys Mason report on "Customer Care Systems: Worldwide Market Shares 2011 names Oracle the global market leader in customer care systems. According to the report Oracle has become communications service providers (CSPs) solution of choice to help accelerate time-to-market for new services, reduce customer support costs and enhance the customer experience and has become as well the leader in overall market share by revenue. The report recognizes Oracle as the leading market supplier of customer care, customer relationship management (CRM) and customer interaction systems.

The Analysys Mason report on "Customer Care Systems: Worldwide Market Shares 2011 names Oracle the global market leader in customer care systems. According to the report Oracle has become communications service providers (CSPs) solution of choice to help accelerate time-to-market for new services, reduce customer support costs and enhance the customer experience and has become as well the leader in overall market share by revenue. The report recognizes Oracle as the leading market supplier of customer care, customer relationship management (CRM) and customer interaction systems.

The Analysys Mason report on "Customer Care Systems: Worldwide Market Shares 2011 names Oracle the global market leader in customer care systems. According to the report Oracle has become communications service providers (CSPs) solution of choice to help accelerate time-to-market for new services, reduce customer support costs and enhance the customer experience and has become as well the leader in overall market share by revenue. The report recognizes Oracle as the leading market supplier of customer care, customer relationship management (CRM) and customer interaction systems.

Gartner found a 1.2 percent increase in IT spending worldwide during 2012 Timothy Prickett Morgan notes. Going forward, "Uncertainties surrounding prospects for an upturn in global economic growth are the major retardants to IT growth," said Gartner's Richard Gordon. With the fiscal cliff avoided for the moment in the U.S., at least modest growth in IT spending can be assumed for 2013. Gartner projects that spending on endpoint devices will accelerate this year, Prickett Morgan writes, outpacing data center system spending. In 2014, Gartner thinks that spending across these two categories will proceed at about 4.2 per cent more than 2013's levels, he observes.

Gartner found a 1.2 percent increase in IT spending worldwide during 2012 Timothy Prickett Morgan notes. Going forward, "Uncertainties surrounding prospects for an upturn in global economic growth are the major retardants to IT growth," said Gartner's Richard Gordon. With the fiscal cliff avoided for the moment in the U.S., at least modest growth in IT spending can be assumed for 2013. Gartner projects that spending on endpoint devices will accelerate this year, Prickett Morgan writes, outpacing data center system spending. In 2014, Gartner thinks that spending across these two categories will proceed at about 4.2 per cent more than 2013's levels, he observes.

Gartner found a 1.2 percent increase in IT spending worldwide during 2012 Timothy Prickett Morgan notes. Going forward, "Uncertainties surrounding prospects for an upturn in global economic growth are the major retardants to IT growth," said Gartner's Richard Gordon. With the fiscal cliff avoided for the moment in the U.S., at least modest growth in IT spending can be assumed for 2013. Gartner projects that spending on endpoint devices will accelerate this year, Prickett Morgan writes, outpacing data center system spending. In 2014, Gartner thinks that spending across these two categories will proceed at about 4.2 per cent more than 2013's levels, he observes.

The SPARC T5 Chip -- eight sockets, 16 cores, (total of 128) that can support eight individual threads for a a total of 1024 functional CPUs -- is the subject of a post by Rick Ramsey, who calls attention to a Q&A with Rick Hetherington that is a deep dive into the chip. Hetherington describes the technical details of the new SPARC T5 processor and expands on the process that is used to design these innovative chips.

The SPARC T5 Chip -- eight sockets, 16 cores, (total of 128) that can support eight individual threads for a a total of 1024 functional CPUs -- is the subject of a post by Rick Ramsey, who calls attention to a Q&A with Rick Hetherington that is a deep dive into the chip. Hetherington describes the technical details of the new SPARC T5 processor and expands on the process that is used to design these innovative chips.

The SPARC T5 Chip -- eight sockets, 16 cores, (total of 128) that can support eight individual threads for a a total of 1024 functional CPUs -- is the subject of a post by Rick Ramsey, who calls attention to a Q&A with Rick Hetherington that is a deep dive into the chip. Hetherington describes the technical details of the new SPARC T5 processor and expands on the process that is used to design these innovative chips.

Communications fraud had become a major issue for Turkcell Hizmetleri, a leading provider of mobile communications in Turkey. The company implemented Oracle Exadata Database Machine X2-2 HC Full Rack, enabling its data analysts to build predictive antifraud models inside the Oracle Database and deploy them into Oracle Exadata for scoring, using Oracle Data Mining. According to Hasan Tonguç, Manager, Turkcell, With Oracle Data Mining, a component of the Oracle Advanced Analytics Option, we can analyze large volumes of customer data and call-data records easier and faster than with any other tool and rapidly detect and combat fraudulent phone use.

Communications fraud had become a major issue for Turkcell Hizmetleri, a leading provider of mobile communications in Turkey. The company implemented Oracle Exadata Database Machine X2-2 HC Full Rack, enabling its data analysts to build predictive antifraud models inside the Oracle Database and deploy them into Oracle Exadata for scoring, using Oracle Data Mining. According to Hasan Tonguç, Manager, Turkcell, With Oracle Data Mining, a component of the Oracle Advanced Analytics Option, we can analyze large volumes of customer data and call-data records easier and faster than with any other tool and rapidly detect and combat fraudulent phone use.

Communications fraud had become a major issue for Turkcell Hizmetleri, a leading provider of mobile communications in Turkey. The company implemented Oracle Exadata Database Machine X2-2 HC Full Rack, enabling its data analysts to build predictive antifraud models inside the Oracle Database and deploy them into Oracle Exadata for scoring, using Oracle Data Mining. According to Hasan Tonguç, Manager, Turkcell, With Oracle Data Mining, a component of the Oracle Advanced Analytics Option, we can analyze large volumes of customer data and call-data records easier and faster than with any other tool and rapidly detect and combat fraudulent phone use.

IDC has published a case study entitled "Making Oracle Database Easier and Faster to Manage and Run: Cardinal Health's Consolidation on Oracle Exadata" that examines Cardinal Health's procedures in consolidating 20 legacy Unix-based RISC databases onto two Oracle Exadata X2-2 half-rack systems. Cardinal Health now runs product searches 43 times faster, and order query times have been cut from an average of 2.7 seconds to 0.17 seconds. Daily aggregate wait times now take 31 hours rather than 347. The CPUs in the legacy system typically ran at 77% of capacity. The CPUs of the two Oracle Exadata systems run at below 10%.

IDC has published a case study entitled "Making Oracle Database Easier and Faster to Manage and Run: Cardinal Health's Consolidation on Oracle Exadata" that examines Cardinal Health's procedures in consolidating 20 legacy Unix-based RISC databases onto two Oracle Exadata X2-2 half-rack systems. Cardinal Health now runs product searches 43 times faster, and order query times have been cut from an average of 2.7 seconds to 0.17 seconds. Daily aggregate wait times now take 31 hours rather than 347. The CPUs in the legacy system typically ran at 77% of capacity. The CPUs of the two Oracle Exadata systems run at below 10%.

IDC has published a case study entitled "Making Oracle Database Easier and Faster to Manage and Run: Cardinal Health's Consolidation on Oracle Exadata" that examines Cardinal Health's procedures in consolidating 20 legacy Unix-based RISC databases onto two Oracle Exadata X2-2 half-rack systems. Cardinal Health now runs product searches 43 times faster, and order query times have been cut from an average of 2.7 seconds to 0.17 seconds. Daily aggregate wait times now take 31 hours rather than 347. The CPUs in the legacy system typically ran at 77% of capacity. The CPUs of the two Oracle Exadata systems run at below 10%.

In the fourth article of his series on virtualization Detlef Drewanz discusses IT resource management as a technology that enables virtualization. Drewanz mentions constraints, scheduling, and partitioning as the three basic mechanisms of resource management typically used to guarantee various virtualization technologies access to limited and shared resources, explaining that these mechanisms are used for different resources based on the requirements of various workloads and virtualization technologies. The most prevalent means of controlling resources in hypervisor-based virtualization environments is partitioning. This is largely because partitioning, unlike constraints and scheduling, avoids overcommitment of CPU resources, he explains.

In the fourth article of his series on virtualization Detlef Drewanz discusses IT resource management as a technology that enables virtualization. Drewanz mentions constraints, scheduling, and partitioning as the three basic mechanisms of resource management typically used to guarantee various virtualization technologies access to limited and shared resources, explaining that these mechanisms are used for different resources based on the requirements of various workloads and virtualization technologies. The most prevalent means of controlling resources in hypervisor-based virtualization environments is partitioning. This is largely because partitioning, unlike constraints and scheduling, avoids overcommitment of CPU resources, he explains.

In the fourth article of his series on virtualization Detlef Drewanz discusses IT resource management as a technology that enables virtualization. Drewanz mentions constraints, scheduling, and partitioning as the three basic mechanisms of resource management typically used to guarantee various virtualization technologies access to limited and shared resources, explaining that these mechanisms are used for different resources based on the requirements of various workloads and virtualization technologies. The most prevalent means of controlling resources in hypervisor-based virtualization environments is partitioning. This is largely because partitioning, unlike constraints and scheduling, avoids overcommitment of CPU resources, he explains.

"ll-Flash arrays are storage systems that are 100% solid state and provide a set of storage features like snapshots and replication similar to traditional hard drive based storage systems. The recent leaks of what EMC plans to do with the technology they acquired through their XtremeIO acquisition is adding fuel to the All-Flash Array fire. This is a legitimate market. Companies like Pure Storage, Nimbus Data Systems, SolidFire, GreenBytes, Skyera, and Tegile all released products in 2012 and many have revenue customers..."

"ll-Flash arrays are storage systems that are 100% solid state and provide a set of storage features like snapshots and replication similar to traditional hard drive based storage systems. The recent leaks of what EMC plans to do with the technology they acquired through their XtremeIO acquisition is adding fuel to the All-Flash Array fire. This is a legitimate market. Companies like Pure Storage, Nimbus Data Systems, SolidFire, GreenBytes, Skyera, and Tegile all released products in 2012 and many have revenue customers..."

"ll-Flash arrays are storage systems that are 100% solid state and provide a set of storage features like snapshots and replication similar to traditional hard drive based storage systems. The recent leaks of what EMC plans to do with the technology they acquired through their XtremeIO acquisition is adding fuel to the All-Flash Array fire. This is a legitimate market. Companies like Pure Storage, Nimbus Data Systems, SolidFire, GreenBytes, Skyera, and Tegile all released products in 2012 and many have revenue customers..."

"The hard drive has been the staple of the storage industry since the first one was shipped in 1956, and will continue to remain so for the foreseeable future. Eventually, new technologies will be developed that allow higher amounts of data to be stored and accessed faster and remain archived longer than possible using hard drives.

CRN takes you back in time, and into the future, to explore the development of hard drive technology, much of which was centered around development at IBM thanks to that company's lock on computer technology for much of the 1950s to 1980s..."

"The hard drive has been the staple of the storage industry since the first one was shipped in 1956, and will continue to remain so for the foreseeable future. Eventually, new technologies will be developed that allow higher amounts of data to be stored and accessed faster and remain archived longer than possible using hard drives.

CRN takes you back in time, and into the future, to explore the development of hard drive technology, much of which was centered around development at IBM thanks to that company's lock on computer technology for much of the 1950s to 1980s..."

"The hard drive has been the staple of the storage industry since the first one was shipped in 1956, and will continue to remain so for the foreseeable future. Eventually, new technologies will be developed that allow higher amounts of data to be stored and accessed faster and remain archived longer than possible using hard drives.

CRN takes you back in time, and into the future, to explore the development of hard drive technology, much of which was centered around development at IBM thanks to that company's lock on computer technology for much of the 1950s to 1980s..."

"A recent article in Nature should have all data storage watchers breathing a little easier. The story detailed the latest theories from an astronomical study conducted by a group of researchers at Michigan State University establishing, among other things, that multiple black holes could keep company within a cluster of the Milky Way galaxy without, you know, shredding the fabric of the universe... how does black-hole behavior theory relate to storage?"

"A recent article in Nature should have all data storage watchers breathing a little easier. The story detailed the latest theories from an astronomical study conducted by a group of researchers at Michigan State University establishing, among other things, that multiple black holes could keep company within a cluster of the Milky Way galaxy without, you know, shredding the fabric of the universe... how does black-hole behavior theory relate to storage?"

"A recent article in Nature should have all data storage watchers breathing a little easier. The story detailed the latest theories from an astronomical study conducted by a group of researchers at Michigan State University establishing, among other things, that multiple black holes could keep company within a cluster of the Milky Way galaxy without, you know, shredding the fabric of the universe... how does black-hole behavior theory relate to storage?"

"Object storage is primed for growth, according to Mark Goros , CEO of Caringo, a provider of object storage software. Goros predicts 2013 will include a number of advancements and revelations in cloud services, Big Data analytics and mobility thanks to wider adoption of object storage..."

"Object storage is primed for growth, according to Mark Goros , CEO of Caringo, a provider of object storage software. Goros predicts 2013 will include a number of advancements and revelations in cloud services, Big Data analytics and mobility thanks to wider adoption of object storage..."

"Object storage is primed for growth, according to Mark Goros , CEO of Caringo, a provider of object storage software. Goros predicts 2013 will include a number of advancements and revelations in cloud services, Big Data analytics and mobility thanks to wider adoption of object storage..."

"With increasing frequency, I'm asked for my thoughts on the emerging software-defined storage category. Whenever I'm presented with a new tech term, I ask whether it truly defines a new product category, or if it's simply an attempt to make an existing technology seem more glamorous. Software-defined storage is a little bit of both. If we really have to have a separate term for this group of products, here is what I think that definition should be..."

"With increasing frequency, I'm asked for my thoughts on the emerging software-defined storage category. Whenever I'm presented with a new tech term, I ask whether it truly defines a new product category, or if it's simply an attempt to make an existing technology seem more glamorous. Software-defined storage is a little bit of both. If we really have to have a separate term for this group of products, here is what I think that definition should be..."

"With increasing frequency, I'm asked for my thoughts on the emerging software-defined storage category. Whenever I'm presented with a new tech term, I ask whether it truly defines a new product category, or if it's simply an attempt to make an existing technology seem more glamorous. Software-defined storage is a little bit of both. If we really have to have a separate term for this group of products, here is what I think that definition should be..."

"Deduplication can be deployed as either a target based solution, where backups are pushed over the network to an appliance where deduplication takes place or a source based approach, where deduplication takes place at the client or server level. Some vendor offerings provide a hybrid of both source and target based deduplication to afford the greatest number of benefits for the end user. As might be expected, the decision to adopt a target, source or hybrid based approach depends largely on the business use case, the characteristics of the underlying data itself and where the particular end user is in their backup technology lifecycle. This article will examine all three approaches to data dedupe and provide guidance on how to determine which is the best fit for your individual requirements..."

"Deduplication can be deployed as either a target based solution, where backups are pushed over the network to an appliance where deduplication takes place or a source based approach, where deduplication takes place at the client or server level. Some vendor offerings provide a hybrid of both source and target based deduplication to afford the greatest number of benefits for the end user. As might be expected, the decision to adopt a target, source or hybrid based approach depends largely on the business use case, the characteristics of the underlying data itself and where the particular end user is in their backup technology lifecycle. This article will examine all three approaches to data dedupe and provide guidance on how to determine which is the best fit for your individual requirements..."

"Deduplication can be deployed as either a target based solution, where backups are pushed over the network to an appliance where deduplication takes place or a source based approach, where deduplication takes place at the client or server level. Some vendor offerings provide a hybrid of both source and target based deduplication to afford the greatest number of benefits for the end user. As might be expected, the decision to adopt a target, source or hybrid based approach depends largely on the business use case, the characteristics of the underlying data itself and where the particular end user is in their backup technology lifecycle. This article will examine all three approaches to data dedupe and provide guidance on how to determine which is the best fit for your individual requirements..."

"Cloud storage, flash storage, storage virtualization software, disaster recovery, and a whole host of technologies are no strangers to solution providers. However, 2013 will be a time of transition as customers seriously look at how to adopt and change those technologies to increase the performance, simplify the management, and squeeze the footprint of their corporate storage environments.

Storage is going flash, right? But how? And what technologies? And the cloud? Watch out for the fine print, including what the actual costs are.

Climate Change? We Believe, When It Comes To DR

All-Flash Storage -- Vendors Will Be Ready

All-Flash Storage -- Market Won't Be Ready

But Flash Will Make Its Impact Felt Even So

Traditional Storage Approaches A Plateau

Software: The Biggest Winner In 2012

Proprietary Storage: The Biggest Loser In 2013

Buy! Buy! Buy!

Cloud Storage Ready, But Not Cloud Prices

Better Be Ready For BYOD And Storage

These issues and more will be hot topics of discussion for solution providers and their customers in 2013. Turn the page and get the conversations started..."

"Cloud storage, flash storage, storage virtualization software, disaster recovery, and a whole host of technologies are no strangers to solution providers. However, 2013 will be a time of transition as customers seriously look at how to adopt and change those technologies to increase the performance, simplify the management, and squeeze the footprint of their corporate storage environments.

Storage is going flash, right? But how? And what technologies? And the cloud? Watch out for the fine print, including what the actual costs are.

Climate Change? We Believe, When It Comes To DR

All-Flash Storage -- Vendors Will Be Ready

All-Flash Storage -- Market Won't Be Ready

But Flash Will Make Its Impact Felt Even So

Traditional Storage Approaches A Plateau

Software: The Biggest Winner In 2012

Proprietary Storage: The Biggest Loser In 2013

Buy! Buy! Buy!

Cloud Storage Ready, But Not Cloud Prices

Better Be Ready For BYOD And Storage

These issues and more will be hot topics of discussion for solution providers and their customers in 2013. Turn the page and get the conversations started..."

"Cloud storage, flash storage, storage virtualization software, disaster recovery, and a whole host of technologies are no strangers to solution providers. However, 2013 will be a time of transition as customers seriously look at how to adopt and change those technologies to increase the performance, simplify the management, and squeeze the footprint of their corporate storage environments.

Storage is going flash, right? But how? And what technologies? And the cloud? Watch out for the fine print, including what the actual costs are.

Climate Change? We Believe, When It Comes To DR

All-Flash Storage -- Vendors Will Be Ready

All-Flash Storage -- Market Won't Be Ready

But Flash Will Make Its Impact Felt Even So

Traditional Storage Approaches A Plateau

Software: The Biggest Winner In 2012

Proprietary Storage: The Biggest Loser In 2013

Buy! Buy! Buy!

Cloud Storage Ready, But Not Cloud Prices

Better Be Ready For BYOD And Storage

These issues and more will be hot topics of discussion for solution providers and their customers in 2013. Turn the page and get the conversations started..."

"My 2012 calls were a mixed bag. Sure, Workday, Salesforce and the SaaS gang became enterprise standard platforms in many respects. But RIM didnt become a software company completely, Microsoft's Nokia partnership is still a work in progress and ultrabooks and Windows 8 aren't exactly big hits.

"My 2012 calls were a mixed bag. Sure, Workday, Salesforce and the SaaS gang became enterprise standard platforms in many respects. But RIM didnt become a software company completely, Microsoft's Nokia partnership is still a work in progress and ultrabooks and Windows 8 aren't exactly big hits.

"My 2012 calls were a mixed bag. Sure, Workday, Salesforce and the SaaS gang became enterprise standard platforms in many respects. But RIM didnt become a software company completely, Microsoft's Nokia partnership is still a work in progress and ultrabooks and Windows 8 aren't exactly big hits.

"Every December, pundits predict what everyone will be talking about in the year ahead. But how can we talk about these predictions if we don't have the words?

Here's my list of words for 2013 that we can all use to talk about -- and make fun of -- emerging trends in technology. Some have been around for a while, languishing in obscurity. Others are brand new:"

Pay-to-spam

Plusify

PAWN

Gangnam Style.

Hangout In Real

PMS

McAflee

"I think 2013 is going to be the year when Google aggressively plusifies everything..."

"Every December, pundits predict what everyone will be talking about in the year ahead. But how can we talk about these predictions if we don't have the words?

Here's my list of words for 2013 that we can all use to talk about -- and make fun of -- emerging trends in technology. Some have been around for a while, languishing in obscurity. Others are brand new:"

Pay-to-spam

Plusify

PAWN

Gangnam Style.

Hangout In Real

PMS

McAflee

"I think 2013 is going to be the year when Google aggressively plusifies everything..."

"Every December, pundits predict what everyone will be talking about in the year ahead. But how can we talk about these predictions if we don't have the words?

Here's my list of words for 2013 that we can all use to talk about -- and make fun of -- emerging trends in technology. Some have been around for a while, languishing in obscurity. Others are brand new:"

Pay-to-spam

Plusify

PAWN

Gangnam Style.

Hangout In Real

PMS

McAflee

"I think 2013 is going to be the year when Google aggressively plusifies everything..."

"The Consumer Electronics Show, scheduled to run January 8-11 in Las Vegas, is about consumer electronics, of course. But the consumerization (terrible word, by the way) of IT has been much of what the business press has focused on over the past year, what with BYOD, cloud computing, social networks and such. So CES, which has managed to do quite well without Apple, and will again this year without a Microsoft keynote, has a lot to show the business community what is coming next for the business-to-business world.

Here are 10 CES 2013 trends and products that will have a business impact..."

"The Consumer Electronics Show, scheduled to run January 8-11 in Las Vegas, is about consumer electronics, of course. But the consumerization (terrible word, by the way) of IT has been much of what the business press has focused on over the past year, what with BYOD, cloud computing, social networks and such. So CES, which has managed to do quite well without Apple, and will again this year without a Microsoft keynote, has a lot to show the business community what is coming next for the business-to-business world.

Here are 10 CES 2013 trends and products that will have a business impact..."

"The Consumer Electronics Show, scheduled to run January 8-11 in Las Vegas, is about consumer electronics, of course. But the consumerization (terrible word, by the way) of IT has been much of what the business press has focused on over the past year, what with BYOD, cloud computing, social networks and such. So CES, which has managed to do quite well without Apple, and will again this year without a Microsoft keynote, has a lot to show the business community what is coming next for the business-to-business world.

Here are 10 CES 2013 trends and products that will have a business impact..."

Oracle is offering free online training for sys admins in Oracle VM, Monica Kumar announces. The date for the Americas audience is Tuesday January 15, 2013, with various start times. For the EMEA audience, the date is Tuesday January 29, 2013, again with various start times. Kumar writes that this training will give registrants the opportunity to dirty their hands with the file systems, install images and management tools for Oracle Solaris, Oracle Linux and Oracle VM in the setting of a proctored lab. Detailed agendas for the training and a Twitter hashtag for the event are available.

Oracle is offering free online training for sys admins in Oracle VM, Monica Kumar announces. The date for the Americas audience is Tuesday January 15, 2013, with various start times. For the EMEA audience, the date is Tuesday January 29, 2013, again with various start times. Kumar writes that this training will give registrants the opportunity to dirty their hands with the file systems, install images and management tools for Oracle Solaris, Oracle Linux and Oracle VM in the setting of a proctored lab. Detailed agendas for the training and a Twitter hashtag for the event are available.

Oracle is offering free online training for sys admins in Oracle VM, Monica Kumar announces. The date for the Americas audience is Tuesday January 15, 2013, with various start times. For the EMEA audience, the date is Tuesday January 29, 2013, again with various start times. Kumar writes that this training will give registrants the opportunity to dirty their hands with the file systems, install images and management tools for Oracle Solaris, Oracle Linux and Oracle VM in the setting of a proctored lab. Detailed agendas for the training and a Twitter hashtag for the event are available.

Solaris 11.1 includes a number of new features, one of which, vmtasks, evoked the most interest from the Solaris user group to which Orgad Kimchi presented a review of the new release and provides a link to the slide deck. vmtasks, Kimchi reported, accelerates such shared memory operations as creation locking and destruction, thereby optimizing system uptime because Oracle DB startup and shutdown are much faster. According to Kimchi every application requiring fast access to shared memory can benefit from this feature.

Solaris 11.1 includes a number of new features, one of which, vmtasks, evoked the most interest from the Solaris user group to which Orgad Kimchi presented a review of the new release and provides a link to the slide deck. vmtasks, Kimchi reported, accelerates such shared memory operations as creation locking and destruction, thereby optimizing system uptime because Oracle DB startup and shutdown are much faster. According to Kimchi every application requiring fast access to shared memory can benefit from this feature.

Solaris 11.1 includes a number of new features, one of which, vmtasks, evoked the most interest from the Solaris user group to which Orgad Kimchi presented a review of the new release and provides a link to the slide deck. vmtasks, Kimchi reported, accelerates such shared memory operations as creation locking and destruction, thereby optimizing system uptime because Oracle DB startup and shutdown are much faster. According to Kimchi every application requiring fast access to shared memory can benefit from this feature.

Version 5.2.45 of the MySQL Workbench GUI tool has been released to GA. This version contains the following significant updates: support for several new MySQL 5.6 features; import recordsets from CSV file for the Inserts editor in Modeling and in the SQL Editor; and improved trigger editor, along with 72 resolved bugs. MySQL Utilities 1.1.1 has been included on the distribution as well. A post by rennox includes links to downloads, binary and source packages, and documentation.

Version 5.2.45 of the MySQL Workbench GUI tool has been released to GA. This version contains the following significant updates: support for several new MySQL 5.6 features; import recordsets from CSV file for the Inserts editor in Modeling and in the SQL Editor; and improved trigger editor, along with 72 resolved bugs. MySQL Utilities 1.1.1 has been included on the distribution as well. A post by rennox includes links to downloads, binary and source packages, and documentation.

Version 5.2.45 of the MySQL Workbench GUI tool has been released to GA. This version contains the following significant updates: support for several new MySQL 5.6 features; import recordsets from CSV file for the Inserts editor in Modeling and in the SQL Editor; and improved trigger editor, along with 72 resolved bugs. MySQL Utilities 1.1.1 has been included on the distribution as well. A post by rennox includes links to downloads, binary and source packages, and documentation.

No one wants to be charged at an unfair rate for IT resource usage. Developing a cloud chargeback system, argues Eric Tran-Le, VP Product Management, Oracle Enterprise Manager, that reveals costs in terms of control, visibility and fairness is the solution to assessing charges fairly and accurately. Creating a cost hierarchy that can report both in aggregate and by business unit is the key, Tran-Le maintains. Such a system must distinguish among the layers of computing services employed (server, middleware, database), and include baseline figures derived from the current workloads utilization that characterize the patterns by groups of users and types of workload.

No one wants to be charged at an unfair rate for IT resource usage. Developing a cloud chargeback system, argues Eric Tran-Le, VP Product Management, Oracle Enterprise Manager, that reveals costs in terms of control, visibility and fairness is the solution to assessing charges fairly and accurately. Creating a cost hierarchy that can report both in aggregate and by business unit is the key, Tran-Le maintains. Such a system must distinguish among the layers of computing services employed (server, middleware, database), and include baseline figures derived from the current workloads utilization that characterize the patterns by groups of users and types of workload.

No one wants to be charged at an unfair rate for IT resource usage. Developing a cloud chargeback system, argues Eric Tran-Le, VP Product Management, Oracle Enterprise Manager, that reveals costs in terms of control, visibility and fairness is the solution to assessing charges fairly and accurately. Creating a cost hierarchy that can report both in aggregate and by business unit is the key, Tran-Le maintains. Such a system must distinguish among the layers of computing services employed (server, middleware, database), and include baseline figures derived from the current workloads utilization that characterize the patterns by groups of users and types of workload.

"Resilience and Reliability on AWS" by Jurg van Vliet, Flavia Pagamelli,and Jasper Geutsen, a new title from O'Reilly, instructs readers in how to build applications in the public cloud that are as network-outage proof as possible. The writers draw on their experiences at 9apps to show how to combine AWS with open source tools such as PostgreSQL, MongoDB, and Redis bolstered by advice on the top 10 tips for surviving outages in the cloud and the use of elasticsearch to build a dependable NoSQL data store. The authors also show how to combine AWS and PostgreSQL to build an RDBMS that scales well.

"Resilience and Reliability on AWS" by Jurg van Vliet, Flavia Pagamelli,and Jasper Geutsen, a new title from O'Reilly, instructs readers in how to build applications in the public cloud that are as network-outage proof as possible. The writers draw on their experiences at 9apps to show how to combine AWS with open source tools such as PostgreSQL, MongoDB, and Redis bolstered by advice on the top 10 tips for surviving outages in the cloud and the use of elasticsearch to build a dependable NoSQL data store. The authors also show how to combine AWS and PostgreSQL to build an RDBMS that scales well.

"Resilience and Reliability on AWS" by Jurg van Vliet, Flavia Pagamelli,and Jasper Geutsen, a new title from O'Reilly, instructs readers in how to build applications in the public cloud that are as network-outage proof as possible. The writers draw on their experiences at 9apps to show how to combine AWS with open source tools such as PostgreSQL, MongoDB, and Redis bolstered by advice on the top 10 tips for surviving outages in the cloud and the use of elasticsearch to build a dependable NoSQL data store. The authors also show how to combine AWS and PostgreSQL to build an RDBMS that scales well.

In a post that explains how to use Oracle's Unbreakable Enterprise Kernel to protect a running Linux kernel, Robert Chase cautions against the introduction of changes in recompiling the kernel that might render the system unbootable. The key, he posts, is in using the Loadable Kernel Modules (LKM), which allows the customization of an environment without compromising the base kernel environment or the stability of your system. Chase presents several examples that demonstrate how signed modules enhance system security by checking modules upon load against the ring of keys compiled into the kernel, preventing invalidly signed modules from being loaded.

In a post that explains how to use Oracle's Unbreakable Enterprise Kernel to protect a running Linux kernel, Robert Chase cautions against the introduction of changes in recompiling the kernel that might render the system unbootable. The key, he posts, is in using the Loadable Kernel Modules (LKM), which allows the customization of an environment without compromising the base kernel environment or the stability of your system. Chase presents several examples that demonstrate how signed modules enhance system security by checking modules upon load against the ring of keys compiled into the kernel, preventing invalidly signed modules from being loaded.

In a post that explains how to use Oracle's Unbreakable Enterprise Kernel to protect a running Linux kernel, Robert Chase cautions against the introduction of changes in recompiling the kernel that might render the system unbootable. The key, he posts, is in using the Loadable Kernel Modules (LKM), which allows the customization of an environment without compromising the base kernel environment or the stability of your system. Chase presents several examples that demonstrate how signed modules enhance system security by checking modules upon load against the ring of keys compiled into the kernel, preventing invalidly signed modules from being loaded.

"We're long into the hype cycle of cloud computing. That means clear criteria to assess and evaluate the different options are critical. Which of the many cloud approaches should medium to large enterprises take to optimize their data center operations?

Typically, the cloud is envisioned as an accessible and low-cost compute utility in the sky that's always available. Despite this lofty promise, companies will need to select and build their cloud environment carefully to avoid fracturing their computing capabilities, locking themselves into a single, higher-cost environment, diminishing their ability to differentiate themselves and gain competitive advantage -- or all three..."

"We're long into the hype cycle of cloud computing. That means clear criteria to assess and evaluate the different options are critical. Which of the many cloud approaches should medium to large enterprises take to optimize their data center operations?

Typically, the cloud is envisioned as an accessible and low-cost compute utility in the sky that's always available. Despite this lofty promise, companies will need to select and build their cloud environment carefully to avoid fracturing their computing capabilities, locking themselves into a single, higher-cost environment, diminishing their ability to differentiate themselves and gain competitive advantage -- or all three..."

"We're long into the hype cycle of cloud computing. That means clear criteria to assess and evaluate the different options are critical. Which of the many cloud approaches should medium to large enterprises take to optimize their data center operations?

Typically, the cloud is envisioned as an accessible and low-cost compute utility in the sky that's always available. Despite this lofty promise, companies will need to select and build their cloud environment carefully to avoid fracturing their computing capabilities, locking themselves into a single, higher-cost environment, diminishing their ability to differentiate themselves and gain competitive advantage -- or all three..."

"Increasing your use of cloud computing? Great! Making these common security mistakes? Not great!..."

"Automation, cost savings, and data redundancyno wonder cloud adoption is tempting. The CISO can rest easy knowing there is no vice in moving to the cloud to reap these rewards. What may keep her up at night is not knowing how many missteps the enterprise is making in the process.

"Increasing your use of cloud computing? Great! Making these common security mistakes? Not great!..."

"Automation, cost savings, and data redundancyno wonder cloud adoption is tempting. The CISO can rest easy knowing there is no vice in moving to the cloud to reap these rewards. What may keep her up at night is not knowing how many missteps the enterprise is making in the process.

"Increasing your use of cloud computing? Great! Making these common security mistakes? Not great!..."

"Automation, cost savings, and data redundancyno wonder cloud adoption is tempting. The CISO can rest easy knowing there is no vice in moving to the cloud to reap these rewards. What may keep her up at night is not knowing how many missteps the enterprise is making in the process.

"Storing information in the public cloud from a growing market of vendors is a viable alternative to on-premise, traditional storage options for some use cases, research firm Gartner says.

But cloud-based storage providers vary widely in their ability to meet the requirements of enterprise IT, which is why customers should rigorously plan and vet vendors before first engaging in a pilot and then deciding if mission-critical data should be moved into the cloud-based storage service..."

"Storing information in the public cloud from a growing market of vendors is a viable alternative to on-premise, traditional storage options for some use cases, research firm Gartner says.

But cloud-based storage providers vary widely in their ability to meet the requirements of enterprise IT, which is why customers should rigorously plan and vet vendors before first engaging in a pilot and then deciding if mission-critical data should be moved into the cloud-based storage service..."

"Storing information in the public cloud from a growing market of vendors is a viable alternative to on-premise, traditional storage options for some use cases, research firm Gartner says.

But cloud-based storage providers vary widely in their ability to meet the requirements of enterprise IT, which is why customers should rigorously plan and vet vendors before first engaging in a pilot and then deciding if mission-critical data should be moved into the cloud-based storage service..."

"The combined forces of digital data growth and the consumerization of IT will come to a head in 2013, and create a wave of increased investment and moves by IT to take back control of corporate data.

Symform, Inc. predicts companies of all sizes will demand that vendors and service providers improve on-ramps to the cloud and SLAs (SLAs) around cloud services. The company expects larger investments in data management, big data, and distributed systems, and believes the use of rogue cloud services in the enterprise will come under increased governance..."

"The combined forces of digital data growth and the consumerization of IT will come to a head in 2013, and create a wave of increased investment and moves by IT to take back control of corporate data.

Symform, Inc. predicts companies of all sizes will demand that vendors and service providers improve on-ramps to the cloud and SLAs (SLAs) around cloud services. The company expects larger investments in data management, big data, and distributed systems, and believes the use of rogue cloud services in the enterprise will come under increased governance..."

"The combined forces of digital data growth and the consumerization of IT will come to a head in 2013, and create a wave of increased investment and moves by IT to take back control of corporate data.

Symform, Inc. predicts companies of all sizes will demand that vendors and service providers improve on-ramps to the cloud and SLAs (SLAs) around cloud services. The company expects larger investments in data management, big data, and distributed systems, and believes the use of rogue cloud services in the enterprise will come under increased governance..."

"We'll see more mobile options and embedded analytics, of course, but surprises will include growth in financial apps and big-data insights.

Some of the trends we'll see in cloud-based enterprise applications in 2013 are obvious, while some might surprise. Here's my take on five trends to expect in the new year, along with examples and advice on how to ride each wave..."

"We'll see more mobile options and embedded analytics, of course, but surprises will include growth in financial apps and big-data insights.

Some of the trends we'll see in cloud-based enterprise applications in 2013 are obvious, while some might surprise. Here's my take on five trends to expect in the new year, along with examples and advice on how to ride each wave..."

"We'll see more mobile options and embedded analytics, of course, but surprises will include growth in financial apps and big-data insights.

Some of the trends we'll see in cloud-based enterprise applications in 2013 are obvious, while some might surprise. Here's my take on five trends to expect in the new year, along with examples and advice on how to ride each wave..."

"The enterprise's reliance on the cloud is expected to increase in the coming years. And most CIOs, seeing that trend, are trying to determine--if they haven't already--whether it's a good idea to follow it and move some services to the Web.

In a new study from identity-management company SailPoint, the cloud's importance is by no means being discounted. However, SailPoint found in its survey of 400 IT and business leaders at organizations across the U.S. and U.K. that while cloud reliance is important to many firms, risk related to the cloud and other trends is growing..."

"The enterprise's reliance on the cloud is expected to increase in the coming years. And most CIOs, seeing that trend, are trying to determine--if they haven't already--whether it's a good idea to follow it and move some services to the Web.

In a new study from identity-management company SailPoint, the cloud's importance is by no means being discounted. However, SailPoint found in its survey of 400 IT and business leaders at organizations across the U.S. and U.K. that while cloud reliance is important to many firms, risk related to the cloud and other trends is growing..."

"The enterprise's reliance on the cloud is expected to increase in the coming years. And most CIOs, seeing that trend, are trying to determine--if they haven't already--whether it's a good idea to follow it and move some services to the Web.

In a new study from identity-management company SailPoint, the cloud's importance is by no means being discounted. However, SailPoint found in its survey of 400 IT and business leaders at organizations across the U.S. and U.K. that while cloud reliance is important to many firms, risk related to the cloud and other trends is growing..."

"On Christmas Eve, Amazon Web services experienced an outage at its Northern Virginia data center. In a prompt follow up, it issued an explanation on Dec. 29, apologized to customers and said it wouldn't happen again. It was the fourth outage of the year in its most heavily trafficked data center complex.

Explanations in the press of what happened, based on the Dec. 29 statement, were relatively brief. The Wall Street Journal, for example, stated that Amazon spokesmen blamed the outage "on a developer who accidentally deleted some key data ...

Amazon said the disruption affected its Elastic Load Balancing Service, which distributes incoming data from applications to be handled by different computing hardware."

"On Christmas Eve, Amazon Web services experienced an outage at its Northern Virginia data center. In a prompt follow up, it issued an explanation on Dec. 29, apologized to customers and said it wouldn't happen again. It was the fourth outage of the year in its most heavily trafficked data center complex.

Explanations in the press of what happened, based on the Dec. 29 statement, were relatively brief. The Wall Street Journal, for example, stated that Amazon spokesmen blamed the outage "on a developer who accidentally deleted some key data ...

Amazon said the disruption affected its Elastic Load Balancing Service, which distributes incoming data from applications to be handled by different computing hardware."

"On Christmas Eve, Amazon Web services experienced an outage at its Northern Virginia data center. In a prompt follow up, it issued an explanation on Dec. 29, apologized to customers and said it wouldn't happen again. It was the fourth outage of the year in its most heavily trafficked data center complex.

Explanations in the press of what happened, based on the Dec. 29 statement, were relatively brief. The Wall Street Journal, for example, stated that Amazon spokesmen blamed the outage "on a developer who accidentally deleted some key data ...

Amazon said the disruption affected its Elastic Load Balancing Service, which distributes incoming data from applications to be handled by different computing hardware."

"A new type of cloud service is emerging which allows CIOs to solicit information or services from other community members. Startups working in this space are raising funding from venture capitalists that view the Web as a platform to more efficiently exchange goods, services and information between providers and consumers in large enterprises. But as these companies try to grow, theyre going to have to choose between marketing to IT executives, and charging for their services, or marketing themselves to a broader audience of end users, and generating revenues through value-added services..."

"A new type of cloud service is emerging which allows CIOs to solicit information or services from other community members. Startups working in this space are raising funding from venture capitalists that view the Web as a platform to more efficiently exchange goods, services and information between providers and consumers in large enterprises. But as these companies try to grow, theyre going to have to choose between marketing to IT executives, and charging for their services, or marketing themselves to a broader audience of end users, and generating revenues through value-added services..."

"A new type of cloud service is emerging which allows CIOs to solicit information or services from other community members. Startups working in this space are raising funding from venture capitalists that view the Web as a platform to more efficiently exchange goods, services and information between providers and consumers in large enterprises. But as these companies try to grow, theyre going to have to choose between marketing to IT executives, and charging for their services, or marketing themselves to a broader audience of end users, and generating revenues through value-added services..."

"Galen Gruman at InfoWorld is offering a dire warning: 2013 is the year IT may lose its "seat at the table" in helping set business strategy. Gruman's warning is worth a read, but he ignores the most important remedy: an IT focus on a company's end customers.

Gruman is downright gloomy in asserting that IT organizations have failed to become a strategic asset:.."

"Galen Gruman at InfoWorld is offering a dire warning: 2013 is the year IT may lose its "seat at the table" in helping set business strategy. Gruman's warning is worth a read, but he ignores the most important remedy: an IT focus on a company's end customers.

Gruman is downright gloomy in asserting that IT organizations have failed to become a strategic asset:.."

"Galen Gruman at InfoWorld is offering a dire warning: 2013 is the year IT may lose its "seat at the table" in helping set business strategy. Gruman's warning is worth a read, but he ignores the most important remedy: an IT focus on a company's end customers.

Gruman is downright gloomy in asserting that IT organizations have failed to become a strategic asset:.."

"American Airlines was well into a simultaneous revamp of its Passenger Services System (PSS) and Flight Operating System (FOS), its two most mission-critical families of applications, when the airline changed course last January.

The plan still calls for a gradual migration off of an inflexible and outdated mainframe architecture in favor of a modern, distributed computing platform. But while the FOS focus has always been buy rather than build whenever possible, the focus for the PSS project has turned sharply away from rewriting all of the applications that make up the system in house in favor of buying existing software whenever possible and modifying it as needed.

"American Airlines was well into a simultaneous revamp of its Passenger Services System (PSS) and Flight Operating System (FOS), its two most mission-critical families of applications, when the airline changed course last January.

The plan still calls for a gradual migration off of an inflexible and outdated mainframe architecture in favor of a modern, distributed computing platform. But while the FOS focus has always been buy rather than build whenever possible, the focus for the PSS project has turned sharply away from rewriting all of the applications that make up the system in house in favor of buying existing software whenever possible and modifying it as needed.

"American Airlines was well into a simultaneous revamp of its Passenger Services System (PSS) and Flight Operating System (FOS), its two most mission-critical families of applications, when the airline changed course last January.

The plan still calls for a gradual migration off of an inflexible and outdated mainframe architecture in favor of a modern, distributed computing platform. But while the FOS focus has always been buy rather than build whenever possible, the focus for the PSS project has turned sharply away from rewriting all of the applications that make up the system in house in favor of buying existing software whenever possible and modifying it as needed.

There is a growing interest in business rules and business rules management systems or business rules engines. Major software vendors, from IBM, Oracle and SAP to RedHat and SAS, have or are developing business rules management systems.

The use of these systems to support the practice of decision management to automate and manage high-volume, transactional decisions is growing rapidly. A new standard, called the Decision Model and Notation standard, is under development that will bring consistency of representation to the industry. Yet there is still a sense that this is a niche technology, and it is somewhat poorly understood outside of its traditional areas of strength. So what is a BRMS and how does it support decision management?

There is a growing interest in business rules and business rules management systems or business rules engines. Major software vendors, from IBM, Oracle and SAP to RedHat and SAS, have or are developing business rules management systems.

The use of these systems to support the practice of decision management to automate and manage high-volume, transactional decisions is growing rapidly. A new standard, called the Decision Model and Notation standard, is under development that will bring consistency of representation to the industry. Yet there is still a sense that this is a niche technology, and it is somewhat poorly understood outside of its traditional areas of strength. So what is a BRMS and how does it support decision management?

There is a growing interest in business rules and business rules management systems or business rules engines. Major software vendors, from IBM, Oracle and SAP to RedHat and SAS, have or are developing business rules management systems.

The use of these systems to support the practice of decision management to automate and manage high-volume, transactional decisions is growing rapidly. A new standard, called the Decision Model and Notation standard, is under development that will bring consistency of representation to the industry. Yet there is still a sense that this is a niche technology, and it is somewhat poorly understood outside of its traditional areas of strength. So what is a BRMS and how does it support decision management?

"Energy efficiency will continue to be a major focus of data center operations over the coming year, but that's not all we'll see.

As 2013 opens with new prospects for data center operations, we'll see new looks at some old themes, especially around energy efficiency. Increased power costs and pressure from environmental groups will lead data center designers to look to new technologies to cut their traditional energy needs. But that's not all we'll see; here are five important trends you can expect to see gain strength in 2013..."

"Energy efficiency will continue to be a major focus of data center operations over the coming year, but that's not all we'll see.

As 2013 opens with new prospects for data center operations, we'll see new looks at some old themes, especially around energy efficiency. Increased power costs and pressure from environmental groups will lead data center designers to look to new technologies to cut their traditional energy needs. But that's not all we'll see; here are five important trends you can expect to see gain strength in 2013..."

"Energy efficiency will continue to be a major focus of data center operations over the coming year, but that's not all we'll see.

As 2013 opens with new prospects for data center operations, we'll see new looks at some old themes, especially around energy efficiency. Increased power costs and pressure from environmental groups will lead data center designers to look to new technologies to cut their traditional energy needs. But that's not all we'll see; here are five important trends you can expect to see gain strength in 2013..."

"Looking back, the year 2012 wasnt as bad for the IT industry as it seemed it would be. The predicted Mayan Apocalypse proved to be a chimera for corporate IT as for the rest of the world. But what might be lying in wait for 2013?

When I told my editor what my last column of 2012 would be about, I said that I would write about how glad I was that its over. But my response may have been colored by the fact that Id just been writing about the apparently endless patent wars. Thats enough to make anyone feel depressed..."

"Looking back, the year 2012 wasnt as bad for the IT industry as it seemed it would be. The predicted Mayan Apocalypse proved to be a chimera for corporate IT as for the rest of the world. But what might be lying in wait for 2013?

When I told my editor what my last column of 2012 would be about, I said that I would write about how glad I was that its over. But my response may have been colored by the fact that Id just been writing about the apparently endless patent wars. Thats enough to make anyone feel depressed..."

"Looking back, the year 2012 wasnt as bad for the IT industry as it seemed it would be. The predicted Mayan Apocalypse proved to be a chimera for corporate IT as for the rest of the world. But what might be lying in wait for 2013?

When I told my editor what my last column of 2012 would be about, I said that I would write about how glad I was that its over. But my response may have been colored by the fact that Id just been writing about the apparently endless patent wars. Thats enough to make anyone feel depressed..."

"They'd like to find better ways to increase the agility of their operations, to help their organizations adeptly adjust to rapidly shifting business conditions. They seek new options to do more with less--as in less energy usage. And they realize they face a talent exodus due to baby boomer retirements, and must get more creative in recruiting, retaining and training new employees. In this case, we're referring to data center professionals and the top business-focused action steps on their "to do" list for 2013, according to a recent survey from the Uptime Institute Network..."

"They'd like to find better ways to increase the agility of their operations, to help their organizations adeptly adjust to rapidly shifting business conditions. They seek new options to do more with less--as in less energy usage. And they realize they face a talent exodus due to baby boomer retirements, and must get more creative in recruiting, retaining and training new employees. In this case, we're referring to data center professionals and the top business-focused action steps on their "to do" list for 2013, according to a recent survey from the Uptime Institute Network..."

"They'd like to find better ways to increase the agility of their operations, to help their organizations adeptly adjust to rapidly shifting business conditions. They seek new options to do more with less--as in less energy usage. And they realize they face a talent exodus due to baby boomer retirements, and must get more creative in recruiting, retaining and training new employees. In this case, we're referring to data center professionals and the top business-focused action steps on their "to do" list for 2013, according to a recent survey from the Uptime Institute Network..."

"It's time for another year of new challenges and new decisions for CIOs. Over the last 12 months, things have changed rapidly in the enterprise world. Mobile products, like those from Apple and Samsung, have more and more made their way into the office. And surprisingly, companies that once stood above the fray in the corporate world, including Research In Motion and Microsoft, have slipped a bit. Its a different world for CIOs.

With that in mind, it's a good time to look ahead and discuss what will matter most to the average CIO over the next year. After all, its better to be prepared for those changes now rather than being unduly surprised later..."

"It's time for another year of new challenges and new decisions for CIOs. Over the last 12 months, things have changed rapidly in the enterprise world. Mobile products, like those from Apple and Samsung, have more and more made their way into the office. And surprisingly, companies that once stood above the fray in the corporate world, including Research In Motion and Microsoft, have slipped a bit. Its a different world for CIOs.

With that in mind, it's a good time to look ahead and discuss what will matter most to the average CIO over the next year. After all, its better to be prepared for those changes now rather than being unduly surprised later..."

"It's time for another year of new challenges and new decisions for CIOs. Over the last 12 months, things have changed rapidly in the enterprise world. Mobile products, like those from Apple and Samsung, have more and more made their way into the office. And surprisingly, companies that once stood above the fray in the corporate world, including Research In Motion and Microsoft, have slipped a bit. Its a different world for CIOs.

With that in mind, it's a good time to look ahead and discuss what will matter most to the average CIO over the next year. After all, its better to be prepared for those changes now rather than being unduly surprised later..."

"When it comes to IT priorities, much of the day-to-day focus is on the cloud, productivity, and lately, mobility. Security is a large concern, but its typically viewed as a secondary concern after a particular technology or solution is introduced into the company. For many IT professionals, trying to keep every project on target, and determining exactly whats needed next or when, is a chore. And keeping the companys assets securing during that process is a daily challenge.

Unfortunately, the idea of suffering a natural or human-made disaster and being able to quickly recover from it is often overlooked by companies. In fact, a new study conducted by IDG Research and FalconStor Software explores the issue of disaster recovery and finds the efforts of many companies to be inadequate. For instance, most of the respondents say their disaster recovery plans are tested only once a year. Nearly 200 qualified respondents participated in the survey...:

"When it comes to IT priorities, much of the day-to-day focus is on the cloud, productivity, and lately, mobility. Security is a large concern, but its typically viewed as a secondary concern after a particular technology or solution is introduced into the company. For many IT professionals, trying to keep every project on target, and determining exactly whats needed next or when, is a chore. And keeping the companys assets securing during that process is a daily challenge.

Unfortunately, the idea of suffering a natural or human-made disaster and being able to quickly recover from it is often overlooked by companies. In fact, a new study conducted by IDG Research and FalconStor Software explores the issue of disaster recovery and finds the efforts of many companies to be inadequate. For instance, most of the respondents say their disaster recovery plans are tested only once a year. Nearly 200 qualified respondents participated in the survey...:

"When it comes to IT priorities, much of the day-to-day focus is on the cloud, productivity, and lately, mobility. Security is a large concern, but its typically viewed as a secondary concern after a particular technology or solution is introduced into the company. For many IT professionals, trying to keep every project on target, and determining exactly whats needed next or when, is a chore. And keeping the companys assets securing during that process is a daily challenge.

Unfortunately, the idea of suffering a natural or human-made disaster and being able to quickly recover from it is often overlooked by companies. In fact, a new study conducted by IDG Research and FalconStor Software explores the issue of disaster recovery and finds the efforts of many companies to be inadequate. For instance, most of the respondents say their disaster recovery plans are tested only once a year. Nearly 200 qualified respondents participated in the survey...:

"For a data center, data loss can either
be a minor inconvenience or a large-scale
catastrophe. Thats why its important to
have backup solutions and a data recovery
system in place. You may think youre fully
protected by simply having these solutions in
your data center, but what if one or more of
them were to fail? In order to avoid a worst case
scenario, you need to have a plan ready
to go, monitor your recovery solutions at all
times, and know what youll do if you need
someone to manually recover your data..."

"For a data center, data loss can either
be a minor inconvenience or a large-scale
catastrophe. Thats why its important to
have backup solutions and a data recovery
system in place. You may think youre fully
protected by simply having these solutions in
your data center, but what if one or more of
them were to fail? In order to avoid a worst case
scenario, you need to have a plan ready
to go, monitor your recovery solutions at all
times, and know what youll do if you need
someone to manually recover your data..."

"For a data center, data loss can either
be a minor inconvenience or a large-scale
catastrophe. Thats why its important to
have backup solutions and a data recovery
system in place. You may think youre fully
protected by simply having these solutions in
your data center, but what if one or more of
them were to fail? In order to avoid a worst case
scenario, you need to have a plan ready
to go, monitor your recovery solutions at all
times, and know what youll do if you need
someone to manually recover your data..."

"Despite what many CIOs think, business continuity planning isnt the same as disaster recovery.

One of my responsibilities at the United States Tennis Association over the past few years has been to develop and test the organizations business continuity plan (BCP). After researching this topic and discussing it with many of my peers I am fascinated to learn how few people understand what this process is really all about!

Most CIOs that Ive spoken with confuse two important but very different things. The first is disaster recovery (DR). When I speak with most CIOs about business continuity planning what they usually talk to me about is DR. While both are important, they are very different things..."

"Despite what many CIOs think, business continuity planning isnt the same as disaster recovery.

One of my responsibilities at the United States Tennis Association over the past few years has been to develop and test the organizations business continuity plan (BCP). After researching this topic and discussing it with many of my peers I am fascinated to learn how few people understand what this process is really all about!

Most CIOs that Ive spoken with confuse two important but very different things. The first is disaster recovery (DR). When I speak with most CIOs about business continuity planning what they usually talk to me about is DR. While both are important, they are very different things..."

"Despite what many CIOs think, business continuity planning isnt the same as disaster recovery.

One of my responsibilities at the United States Tennis Association over the past few years has been to develop and test the organizations business continuity plan (BCP). After researching this topic and discussing it with many of my peers I am fascinated to learn how few people understand what this process is really all about!

Most CIOs that Ive spoken with confuse two important but very different things. The first is disaster recovery (DR). When I speak with most CIOs about business continuity planning what they usually talk to me about is DR. While both are important, they are very different things..."

"Near Field Communication (NFC) is a short-range wireless communication technology that can be used to pay for retail transactions and other digital exchanges.

NFC is already appearing in many smartphones and some tablets, and has been widely deployed for years in Japan and South Korea for tasks including transit rides and small retail purchases. Early NFC trials for purchases are underway in Europe, India and the U.S..."

"Near Field Communication (NFC) is a short-range wireless communication technology that can be used to pay for retail transactions and other digital exchanges.

NFC is already appearing in many smartphones and some tablets, and has been widely deployed for years in Japan and South Korea for tasks including transit rides and small retail purchases. Early NFC trials for purchases are underway in Europe, India and the U.S..."

"Near Field Communication (NFC) is a short-range wireless communication technology that can be used to pay for retail transactions and other digital exchanges.

NFC is already appearing in many smartphones and some tablets, and has been widely deployed for years in Japan and South Korea for tasks including transit rides and small retail purchases. Early NFC trials for purchases are underway in Europe, India and the U.S..."

"Near Field Communication (NFC) is steadily making headway in the U.S. for sharing data and music among smartphones, but the technology faces years of slow growth as a replacement for physical wallets.

NFC will take a minimum of three more years to grab hold as a technology that enables so-called mobile wallets as a replacement for credit cards and cash in the U.S., according to a consensus of five analysts. And by "grab hold," these analysts mean being used by only 10% of mobile phone users to make digital purchases.

Gartner analyst Avivah Litan predicts that NFC payments will hit the 10% threshold in 2015, compared to the process of SMS (texting) payments that is expected to represent 50% of mobile payment volume globally in that same year..."

"Near Field Communication (NFC) is steadily making headway in the U.S. for sharing data and music among smartphones, but the technology faces years of slow growth as a replacement for physical wallets.

NFC will take a minimum of three more years to grab hold as a technology that enables so-called mobile wallets as a replacement for credit cards and cash in the U.S., according to a consensus of five analysts. And by "grab hold," these analysts mean being used by only 10% of mobile phone users to make digital purchases.

Gartner analyst Avivah Litan predicts that NFC payments will hit the 10% threshold in 2015, compared to the process of SMS (texting) payments that is expected to represent 50% of mobile payment volume globally in that same year..."

"Near Field Communication (NFC) is steadily making headway in the U.S. for sharing data and music among smartphones, but the technology faces years of slow growth as a replacement for physical wallets.

NFC will take a minimum of three more years to grab hold as a technology that enables so-called mobile wallets as a replacement for credit cards and cash in the U.S., according to a consensus of five analysts. And by "grab hold," these analysts mean being used by only 10% of mobile phone users to make digital purchases.

Gartner analyst Avivah Litan predicts that NFC payments will hit the 10% threshold in 2015, compared to the process of SMS (texting) payments that is expected to represent 50% of mobile payment volume globally in that same year..."

"As revenue for new software licenses is down, software vendors are focusing more on licensing audits to recover some of that lost income. Here's a look at some of the steps a corporate IT organization can take before the auditors arrive to maintain compliance and limit potential damage..."

"As revenue for new software licenses is down, software vendors are focusing more on licensing audits to recover some of that lost income. Here's a look at some of the steps a corporate IT organization can take before the auditors arrive to maintain compliance and limit potential damage..."

"As revenue for new software licenses is down, software vendors are focusing more on licensing audits to recover some of that lost income. Here's a look at some of the steps a corporate IT organization can take before the auditors arrive to maintain compliance and limit potential damage..."

"Moving a data center can be a
stressful process. Not only do you have
to manage a large-scale shift of equipment
and software to a new location,
you also have to make sure you aren't
impacting the productivity of employees
at your current facility. And once everything
arrives at the location, the installation
and implementation of solutions is
a seemingly insurmountable task in its
own right..."

"Moving a data center can be a
stressful process. Not only do you have
to manage a large-scale shift of equipment
and software to a new location,
you also have to make sure you aren't
impacting the productivity of employees
at your current facility. And once everything
arrives at the location, the installation
and implementation of solutions is
a seemingly insurmountable task in its
own right..."

"Moving a data center can be a
stressful process. Not only do you have
to manage a large-scale shift of equipment
and software to a new location,
you also have to make sure you aren't
impacting the productivity of employees
at your current facility. And once everything
arrives at the location, the installation
and implementation of solutions is
a seemingly insurmountable task in its
own right..."

"There is increasing demand for data center space in multi-tenant facilities driven by a number of trends, according to a new report.

In the top 20 markets in the U.S., which include Northern Virginia, New York, Boston, Seattle and Silicon Valley, there is a total of 22.1 million square feet of data center operational space, according to 451 Research. Operational space is revenue-producing space in a data center.

The amount of data center space is growing, on average, about 9% a year, the market research firm said..."

"There is increasing demand for data center space in multi-tenant facilities driven by a number of trends, according to a new report.

In the top 20 markets in the U.S., which include Northern Virginia, New York, Boston, Seattle and Silicon Valley, there is a total of 22.1 million square feet of data center operational space, according to 451 Research. Operational space is revenue-producing space in a data center.

The amount of data center space is growing, on average, about 9% a year, the market research firm said..."

"There is increasing demand for data center space in multi-tenant facilities driven by a number of trends, according to a new report.

In the top 20 markets in the U.S., which include Northern Virginia, New York, Boston, Seattle and Silicon Valley, there is a total of 22.1 million square feet of data center operational space, according to 451 Research. Operational space is revenue-producing space in a data center.

The amount of data center space is growing, on average, about 9% a year, the market research firm said..."

"As we close out 2012, there is no doubt that this year will go down as epic in the history books of information security professionals. Looking back on the year its not hard to find a laundry list of security programs that have been overrun by nefarious perpetrators or to see how dramatically different the risk landscape is today than just a year ago. Taking stock of it all, the following are some of the most notable attacks:..."

"As we close out 2012, there is no doubt that this year will go down as epic in the history books of information security professionals. Looking back on the year its not hard to find a laundry list of security programs that have been overrun by nefarious perpetrators or to see how dramatically different the risk landscape is today than just a year ago. Taking stock of it all, the following are some of the most notable attacks:..."

"As we close out 2012, there is no doubt that this year will go down as epic in the history books of information security professionals. Looking back on the year its not hard to find a laundry list of security programs that have been overrun by nefarious perpetrators or to see how dramatically different the risk landscape is today than just a year ago. Taking stock of it all, the following are some of the most notable attacks:..."

"The U.S. Postal Service will be the guinea pig for a White House-led effort to accelerate government adoption of technologies that allow federal agencies to accept third-party identity credentials for online services. The program involves using services from organizations like PayPal and Google through standards like OpenID rather than requiring users to create government usernames and passwords..."

"The U.S. Postal Service will be the guinea pig for a White House-led effort to accelerate government adoption of technologies that allow federal agencies to accept third-party identity credentials for online services. The program involves using services from organizations like PayPal and Google through standards like OpenID rather than requiring users to create government usernames and passwords..."

"The U.S. Postal Service will be the guinea pig for a White House-led effort to accelerate government adoption of technologies that allow federal agencies to accept third-party identity credentials for online services. The program involves using services from organizations like PayPal and Google through standards like OpenID rather than requiring users to create government usernames and passwords..."

On the information security front, 2012 was notable in numerous ways: for Muslim hacktivists launching distributed denial-of-service (DDoS) attacks against U.S. banks, the FBI busting alleged LulzSec and Anonymous leaders, eccentric antivirus founder John McAfee's flight from justice, the apparent data security missteps of the former director of the CIA, as well as a nonstop stream of website hacks, defacements, and data breaches..."

On the information security front, 2012 was notable in numerous ways: for Muslim hacktivists launching distributed denial-of-service (DDoS) attacks against U.S. banks, the FBI busting alleged LulzSec and Anonymous leaders, eccentric antivirus founder John McAfee's flight from justice, the apparent data security missteps of the former director of the CIA, as well as a nonstop stream of website hacks, defacements, and data breaches..."

On the information security front, 2012 was notable in numerous ways: for Muslim hacktivists launching distributed denial-of-service (DDoS) attacks against U.S. banks, the FBI busting alleged LulzSec and Anonymous leaders, eccentric antivirus founder John McAfee's flight from justice, the apparent data security missteps of the former director of the CIA, as well as a nonstop stream of website hacks, defacements, and data breaches..."

"The statistics are staggering: Last year, Symantec blocked a total of over 5.5 billion malware attacks, an 81% increase over 2010, and reported a 35% increase in Web-based attacks and a 41% increase in new variants of malware.

If those findings, documented in the company's latest annual Internet Security Threat Report, cause IT leaders to wonder if they've done everything possible to protect their companies, they might consider looking in the mirror.

That's because security folks, in struggling to establish policies and procedures that are both effective and easy to use, often forget a third and crucial step, experts say: Communicating their security goals in such a way that the broad corporate population not only understands but responds..."

"The statistics are staggering: Last year, Symantec blocked a total of over 5.5 billion malware attacks, an 81% increase over 2010, and reported a 35% increase in Web-based attacks and a 41% increase in new variants of malware.

If those findings, documented in the company's latest annual Internet Security Threat Report, cause IT leaders to wonder if they've done everything possible to protect their companies, they might consider looking in the mirror.

That's because security folks, in struggling to establish policies and procedures that are both effective and easy to use, often forget a third and crucial step, experts say: Communicating their security goals in such a way that the broad corporate population not only understands but responds..."

"The statistics are staggering: Last year, Symantec blocked a total of over 5.5 billion malware attacks, an 81% increase over 2010, and reported a 35% increase in Web-based attacks and a 41% increase in new variants of malware.

If those findings, documented in the company's latest annual Internet Security Threat Report, cause IT leaders to wonder if they've done everything possible to protect their companies, they might consider looking in the mirror.

That's because security folks, in struggling to establish policies and procedures that are both effective and easy to use, often forget a third and crucial step, experts say: Communicating their security goals in such a way that the broad corporate population not only understands but responds..."

"For much of the past quarter century, computer crime has been a decidedly First World problem. But that's about to change, security experts say...

Africa has one of the world's fastest growing middle classes. And, with that growing prosperity comes a growing reliance on technology and the Internet. The result: developing nations, including those in Africa, are set to experience an explosion in cyber crime, as more and more of their citizens connect to the Internet and the web using smart phones high capacity 3G and 4G cellular networks, according to numerous reports from public and private research groups..."

"For much of the past quarter century, computer crime has been a decidedly First World problem. But that's about to change, security experts say...

Africa has one of the world's fastest growing middle classes. And, with that growing prosperity comes a growing reliance on technology and the Internet. The result: developing nations, including those in Africa, are set to experience an explosion in cyber crime, as more and more of their citizens connect to the Internet and the web using smart phones high capacity 3G and 4G cellular networks, according to numerous reports from public and private research groups..."

"For much of the past quarter century, computer crime has been a decidedly First World problem. But that's about to change, security experts say...

Africa has one of the world's fastest growing middle classes. And, with that growing prosperity comes a growing reliance on technology and the Internet. The result: developing nations, including those in Africa, are set to experience an explosion in cyber crime, as more and more of their citizens connect to the Internet and the web using smart phones high capacity 3G and 4G cellular networks, according to numerous reports from public and private research groups..."

"I'm not advocating the hiring of computer criminals. If you are being held to ransom by someone claiming to have control of your infrastructure, and demanding payment to prevent further damage or exposure, then you need to contact the relevant authorities.

However, if you want to prevent criminals from hijacking your systems then perhaps a hacker is exactly the person you need for the job. At AlienVault, we pride ourselves in working with hackers and having them as part of our team..."

"I'm not advocating the hiring of computer criminals. If you are being held to ransom by someone claiming to have control of your infrastructure, and demanding payment to prevent further damage or exposure, then you need to contact the relevant authorities.

However, if you want to prevent criminals from hijacking your systems then perhaps a hacker is exactly the person you need for the job. At AlienVault, we pride ourselves in working with hackers and having them as part of our team..."

"I'm not advocating the hiring of computer criminals. If you are being held to ransom by someone claiming to have control of your infrastructure, and demanding payment to prevent further damage or exposure, then you need to contact the relevant authorities.

However, if you want to prevent criminals from hijacking your systems then perhaps a hacker is exactly the person you need for the job. At AlienVault, we pride ourselves in working with hackers and having them as part of our team..."

"It's a tough world out there. Anyone whos ever worked in IT knows just how tough it is. And if youre not totally up for the challenge, there will always be someone else who is. But for anyone considering getting into the world of IT, or for those considering getting out of IT how do you know? How do you know whether you are really cut out for the career that chews up and spits out its young? Well, I have a handy list of signs that maybe IT isn't the best fit for you."

"It's a tough world out there. Anyone whos ever worked in IT knows just how tough it is. And if youre not totally up for the challenge, there will always be someone else who is. But for anyone considering getting into the world of IT, or for those considering getting out of IT how do you know? How do you know whether you are really cut out for the career that chews up and spits out its young? Well, I have a handy list of signs that maybe IT isn't the best fit for you."

"It's a tough world out there. Anyone whos ever worked in IT knows just how tough it is. And if youre not totally up for the challenge, there will always be someone else who is. But for anyone considering getting into the world of IT, or for those considering getting out of IT how do you know? How do you know whether you are really cut out for the career that chews up and spits out its young? Well, I have a handy list of signs that maybe IT isn't the best fit for you."

"Before looking at all the great predictions and announcements people are going to make about 2013, why not take a look back at a few predictions people have made in the past  predictions that have turned out to be incredibly wrong. From disbelief at computers to outrage at the suggestion of space travel, this list of some of the biggest prediction blunders is sure to put a smile on your face ( and let you take the predictions for 2013 with a grain of salt)..."

"Before looking at all the great predictions and announcements people are going to make about 2013, why not take a look back at a few predictions people have made in the past  predictions that have turned out to be incredibly wrong. From disbelief at computers to outrage at the suggestion of space travel, this list of some of the biggest prediction blunders is sure to put a smile on your face ( and let you take the predictions for 2013 with a grain of salt)..."

"Before looking at all the great predictions and announcements people are going to make about 2013, why not take a look back at a few predictions people have made in the past  predictions that have turned out to be incredibly wrong. From disbelief at computers to outrage at the suggestion of space travel, this list of some of the biggest prediction blunders is sure to put a smile on your face ( and let you take the predictions for 2013 with a grain of salt)..."

"The New Year is almost here. 2012 proved to be a tumultuous year for IT pros and 2013 is looking to be just as challenging. However, the IT job market has been slowly gaining strength and as more companies start growing and adding staff, employees who have been waiting for this turnaround are getting ready to spring into action.

Even if you are happy with your current IT job or role, there is a chance you might find yourself looking for a new position this year due to downsizing, outsourcing or reorganization..."

"The New Year is almost here. 2012 proved to be a tumultuous year for IT pros and 2013 is looking to be just as challenging. However, the IT job market has been slowly gaining strength and as more companies start growing and adding staff, employees who have been waiting for this turnaround are getting ready to spring into action.

Even if you are happy with your current IT job or role, there is a chance you might find yourself looking for a new position this year due to downsizing, outsourcing or reorganization..."

"The New Year is almost here. 2012 proved to be a tumultuous year for IT pros and 2013 is looking to be just as challenging. However, the IT job market has been slowly gaining strength and as more companies start growing and adding staff, employees who have been waiting for this turnaround are getting ready to spring into action.

Even if you are happy with your current IT job or role, there is a chance you might find yourself looking for a new position this year due to downsizing, outsourcing or reorganization..."

"IT professionals may find themselves sitting in the driver's seat when it comes to the job market. The vast majority of hiring managers say they expect to increase tech staffing over the next six months, with many indicating that the increase in available positions will be "substantial," according to a recent survey report from Dice. That said, it's taking longer to fill jobs, due to continued challenges in finding the right candidates. Maybe that's why those receiving offers are leveraging their opportunity, often asking for more money and/or counter-offering the initial proposal. Overall, Dice reports that IT workers should interpret the results with what it calls "tempered optimism." Says Alice Hill, managing director of Dice.com..."

"IT professionals may find themselves sitting in the driver's seat when it comes to the job market. The vast majority of hiring managers say they expect to increase tech staffing over the next six months, with many indicating that the increase in available positions will be "substantial," according to a recent survey report from Dice. That said, it's taking longer to fill jobs, due to continued challenges in finding the right candidates. Maybe that's why those receiving offers are leveraging their opportunity, often asking for more money and/or counter-offering the initial proposal. Overall, Dice reports that IT workers should interpret the results with what it calls "tempered optimism." Says Alice Hill, managing director of Dice.com..."

"IT professionals may find themselves sitting in the driver's seat when it comes to the job market. The vast majority of hiring managers say they expect to increase tech staffing over the next six months, with many indicating that the increase in available positions will be "substantial," according to a recent survey report from Dice. That said, it's taking longer to fill jobs, due to continued challenges in finding the right candidates. Maybe that's why those receiving offers are leveraging their opportunity, often asking for more money and/or counter-offering the initial proposal. Overall, Dice reports that IT workers should interpret the results with what it calls "tempered optimism." Says Alice Hill, managing director of Dice.com..."

"Are your organization's executives providing little more than lip service to social media? Prior surveys presented here have indicated that high-performing companies take a pro-active approach to the monitoring, analyzing and responding of the comments of social media users. Still, a surprising number of CEOs aren't considering social-media reputation in making decisions, and some still simply ignore critical posts, according to a recent survey from Zeno Group.."

"Are your organization's executives providing little more than lip service to social media? Prior surveys presented here have indicated that high-performing companies take a pro-active approach to the monitoring, analyzing and responding of the comments of social media users. Still, a surprising number of CEOs aren't considering social-media reputation in making decisions, and some still simply ignore critical posts, according to a recent survey from Zeno Group.."

"Are your organization's executives providing little more than lip service to social media? Prior surveys presented here have indicated that high-performing companies take a pro-active approach to the monitoring, analyzing and responding of the comments of social media users. Still, a surprising number of CEOs aren't considering social-media reputation in making decisions, and some still simply ignore critical posts, according to a recent survey from Zeno Group.."

"What will 2013 bring for big data vendors and users? Hey, your guess is as good as ours. But 'tis the season for pugnacious prognosticators to don their soothsayer caps, and it seems some companies have a predilection for prophecy, or something like that.

Anyway, we've compiled a prediction-palooza of five 2013 big data projections that have come our way in the past week or so. What do you think? Are these shrewd speculations, obvious observations, or foolish forecasts?..."

"What will 2013 bring for big data vendors and users? Hey, your guess is as good as ours. But 'tis the season for pugnacious prognosticators to don their soothsayer caps, and it seems some companies have a predilection for prophecy, or something like that.

Anyway, we've compiled a prediction-palooza of five 2013 big data projections that have come our way in the past week or so. What do you think? Are these shrewd speculations, obvious observations, or foolish forecasts?..."

"What will 2013 bring for big data vendors and users? Hey, your guess is as good as ours. But 'tis the season for pugnacious prognosticators to don their soothsayer caps, and it seems some companies have a predilection for prophecy, or something like that.

Anyway, we've compiled a prediction-palooza of five 2013 big data projections that have come our way in the past week or so. What do you think? Are these shrewd speculations, obvious observations, or foolish forecasts?..."

"Let's imagine that big data can be compared to TV. This may sound far-fetched, but it might prove to be a good analogy, and at least it will break the monotony surrounding big data.

If we believe the many blogs, tweets and Web seminars that contemplate big data, its about little more than heavyweight technology. Worse yet, when authors do mention uses of big data analysis, they typically fail to distinguish such use cases from whatever we were supposed to have gained before..."

"Let's imagine that big data can be compared to TV. This may sound far-fetched, but it might prove to be a good analogy, and at least it will break the monotony surrounding big data.

If we believe the many blogs, tweets and Web seminars that contemplate big data, its about little more than heavyweight technology. Worse yet, when authors do mention uses of big data analysis, they typically fail to distinguish such use cases from whatever we were supposed to have gained before..."

"Let's imagine that big data can be compared to TV. This may sound far-fetched, but it might prove to be a good analogy, and at least it will break the monotony surrounding big data.

If we believe the many blogs, tweets and Web seminars that contemplate big data, its about little more than heavyweight technology. Worse yet, when authors do mention uses of big data analysis, they typically fail to distinguish such use cases from whatever we were supposed to have gained before..."

"Big data is a big deal for companies in 2013. The prospect of outdistancing your competition by leveraging your company's data with huge data sources such as NASA, the government, video and demographic services is compelling.

But there's evidence that technology is advancing faster than companies and governments can manage it. Along with big data technology developers, your company should be thinking about adding a "big data ethicist."

"Big data is a big deal for companies in 2013. The prospect of outdistancing your competition by leveraging your company's data with huge data sources such as NASA, the government, video and demographic services is compelling.

But there's evidence that technology is advancing faster than companies and governments can manage it. Along with big data technology developers, your company should be thinking about adding a "big data ethicist."

"Big data is a big deal for companies in 2013. The prospect of outdistancing your competition by leveraging your company's data with huge data sources such as NASA, the government, video and demographic services is compelling.

But there's evidence that technology is advancing faster than companies and governments can manage it. Along with big data technology developers, your company should be thinking about adding a "big data ethicist."

"What exactly is big data? Explanations vary, of course, but Gartner's popular 3V model -- essentially that big data is high-volume, high-velocity, and high-variety information that requires new tools to manage -- is the most commonly quoted definition. Still, a haze of ambiguity surrounds big data, an issue that the Open Data Center Alliance (ODCA) hopes to resolve with its new "Big Data Consumer Guide," a handbook for enterprises that want to know what big data is, why it matters, and how to gain from it..."

"What exactly is big data? Explanations vary, of course, but Gartner's popular 3V model -- essentially that big data is high-volume, high-velocity, and high-variety information that requires new tools to manage -- is the most commonly quoted definition. Still, a haze of ambiguity surrounds big data, an issue that the Open Data Center Alliance (ODCA) hopes to resolve with its new "Big Data Consumer Guide," a handbook for enterprises that want to know what big data is, why it matters, and how to gain from it..."

"What exactly is big data? Explanations vary, of course, but Gartner's popular 3V model -- essentially that big data is high-volume, high-velocity, and high-variety information that requires new tools to manage -- is the most commonly quoted definition. Still, a haze of ambiguity surrounds big data, an issue that the Open Data Center Alliance (ODCA) hopes to resolve with its new "Big Data Consumer Guide," a handbook for enterprises that want to know what big data is, why it matters, and how to gain from it..."

"Smartphones and tablets fueled the rise of BYOD in 2012, but better management of those devices is top of mind in 2013...

The proliferation of user-owned smartphones and tablets across the workplace isn't going to stop, so it's likely BYOD-related terms will continue to pepper the IT lexicon a year from now. Many of the practices and technologies that surround these devices are primed for a shake-up, however. What will 2013 mean to enterprise mobility strategies? We break down seven trends to watch in the new year..."

"Smartphones and tablets fueled the rise of BYOD in 2012, but better management of those devices is top of mind in 2013...

The proliferation of user-owned smartphones and tablets across the workplace isn't going to stop, so it's likely BYOD-related terms will continue to pepper the IT lexicon a year from now. Many of the practices and technologies that surround these devices are primed for a shake-up, however. What will 2013 mean to enterprise mobility strategies? We break down seven trends to watch in the new year..."

"Smartphones and tablets fueled the rise of BYOD in 2012, but better management of those devices is top of mind in 2013...

The proliferation of user-owned smartphones and tablets across the workplace isn't going to stop, so it's likely BYOD-related terms will continue to pepper the IT lexicon a year from now. Many of the practices and technologies that surround these devices are primed for a shake-up, however. What will 2013 mean to enterprise mobility strategies? We break down seven trends to watch in the new year..."

"In an exclusive interview, Sanjay Poonen, President and Corporate Officer, Global Solutions and Head of Mobility Divisions, SAP shares how enterprises can ride the BYOD wave, while ensuring security. He also talks about the opportunities emerging in the mobility space..."

"In an exclusive interview, Sanjay Poonen, President and Corporate Officer, Global Solutions and Head of Mobility Divisions, SAP shares how enterprises can ride the BYOD wave, while ensuring security. He also talks about the opportunities emerging in the mobility space..."

"In an exclusive interview, Sanjay Poonen, President and Corporate Officer, Global Solutions and Head of Mobility Divisions, SAP shares how enterprises can ride the BYOD wave, while ensuring security. He also talks about the opportunities emerging in the mobility space..."

"In this 2012 Storage Decisions Chicago presentation, Jon Toigo, CEO and managing principal of Toigo Partners International, and chairman of the Data Management Institute, discusses the Linear Tape File System and solid-state drives, two technologies that can provide next-generation storage performance at a fraction of the power consumption seen in data centers today. Watch the video above or read the transcript below to learn more..."

"In this 2012 Storage Decisions Chicago presentation, Jon Toigo, CEO and managing principal of Toigo Partners International, and chairman of the Data Management Institute, discusses the Linear Tape File System and solid-state drives, two technologies that can provide next-generation storage performance at a fraction of the power consumption seen in data centers today. Watch the video above or read the transcript below to learn more..."

"In this 2012 Storage Decisions Chicago presentation, Jon Toigo, CEO and managing principal of Toigo Partners International, and chairman of the Data Management Institute, discusses the Linear Tape File System and solid-state drives, two technologies that can provide next-generation storage performance at a fraction of the power consumption seen in data centers today. Watch the video above or read the transcript below to learn more..."